Verified Firewall Policy Transformations for Test Case Generation

Size: px
Start display at page:

Download "Verified Firewall Policy Transformations for Test Case Generation"

Transcription

1 Verified Firewall Policy Transformations for Test Case Generation Achim D. Brucker, Lukas Brügger, Paul Kearney, and Burkhart Wolff SAP Research, Vincenz-Priessnitz-Str. 1, Karlsruhe, Germany Information Security, ETH Zurich, 8092 Zurich, Switzerland 1 lukas.bruegger@inf.ethz.ch Security Futures Practice, BT Innovate & Design, Adastral Park, Ipswich, UK paul.3.kearney@bt.com Université Paris-Sud, Parc Club Orsay Université, Orsay Cedex, France 2 wolff@lri.fr Abstract We present an optimization technique for modelbased generation of test cases for firewalls. Starting from a formal model for firewall policies in higher-order logic, we derive a collection of semantics-preserving policy transformation rules and an algorithm that optimizes the specification with respect of the number of test cases required for path coverage. The correctness of the rules and the algorithm is established by formal proofs in Isabelle/HOL. Finally, we use the normalized policies to generate test cases with the domain-specific firewall testing tool HOL-TESTGEN/FW. The resulting procedure is characterized by a gain in efficiency of two orders of magnitude. It can handle configurations with hundreds of rules such as frequently occur in practice. Our approach can be seen as an instance of a methodology to tame inherent state-space explosions in test case generation for security policies. Keywords-Security testing, model-based testing I. INTRODUCTION Firewalls suffer from the same quality problems as other complex software, but mature products from established and trusted vendors are generally trustworthy and any vulnerabilities tend to be found and patched relatively quickly. Given this situation, is there need for anyone other than firewall manufacturers, independent labs, and organizations with critical security requirements to test firewalls? The answer is yes, because the off-the-shelf product must be configured with a rule set that implements an appropriate security policy to create a working firewall. The likelihood of a security vulnerability arising from misconfiguration is much greater than from a bug the software itself: NSA found that inappropriate or incorrect security configurations (most often caused by configuration errors at the local base level) were responsible for 80 percent of Air Force vulnerabilities. [1, p. 55] As firewalls tend to have complicated configurations, this seems to be particularly true for them. Furthermore, firewall policies and hence rule sets change with time. Often, changes 1 This work was supported by BT Group plc. 2 This work was partially supported by the Digiteo Foundation. are implemented by adding rules, resulting in ever-growing complexity, which increases the probability of errors and the challenge of finding them. Thus, there is a continuing need to re-validate that the configured firewall complies with the security policy, and the importance and difficulty of this increases with time. While it is useful to verify the rule set by inspection helped by such analysis tools as are available, this is no substitute for actually testing that the firewall really behaves as specified by the security policies from which the rule set is derived. To appreciate the potential consequences of errors in apparently trustworthy network components, consider this recent incident in which an inexperienced administrator coupled with an intolerance of certain widely used routers to long autonomous system paths, led to a partial Internet break-down: On Monday, February 16, 2009, a misconfigured router from SuproNet, a Czech Internet Service Provider, caused high increases in Border Gateway Protocol (BGP) updates as well as isolated outages for Internet services around the world. [2] In [3], we presented a model-based testing technique for network components such as routers or firewalls. Based on a formal model of networks, packets, and security policies, our HOL-TESTGEN system automatically generates test-sets covering all the partitions of the underlying disjunctive normal form (DNF), at least for small policies. In this paper, we concentrate on improving the effectiveness of our approach to make it more feasible for larger applications. Even modest size companies will have firewalls with several hundred rules. While it is possible that these rule sets could be partitioned into largely independent virtual firewalls, scalability is an important property for any practically-relevant test-generation technique. Constructing systematic tests on security policies leads inevitably to large cascades of case distinctions over input and output. The situation is worse if the underlying state is evolving over time (as in stateful firewalls). A careful analysis of the constraint resolution process of HOL-TESTGEN loaded with the firewall policy theory de-

2 scribed in [3] revealed that many case-splits are concerned with intra-subnet communication and are in fact redundant for the overall problem of communication between networks across a firewall. Since redundant cases can already be detected syntactically on a sequence of policy rules, this gives rise to the idea of a normalization of policies before the actual case-splitting is executed. Our contributions are three-fold: first, we present a firewall policy transformation that: a) eliminates redundant (shadowed) rules, b) groups rules along the subnet-hierarchy, and c) produces tests only between pairs of networks. Second, we show the correctness of our firewall policy transformation formally using Isabelle/HOL, and define a function in higher-order logic (also shown to be correct) that applies the rules to achieve a normal form. And, third, we show in several case studies, that this policy transformation increases the efficiency of test case generation by at least two orders of magnitude. The rest of the paper is structured as follows: After an introduction to the HOL-TESTGEN approach (Section II) and our formal firewall model (Section III), we present a number of policy transformations in Section IV and a normalization procedure in Section V. Both sections include a formal proof of correctness. The paper concludes with an empirical evaluation and a general discussion of the methodology. II. FORMAL AND TECHNICAL BACKGROUND A. Isabelle and Higher-order Logic Isabelle [4] is a generic theorem prover; new object logics can be introduced by specifying their syntax and natural deduction inference rules. Among other logics, Isabelle supports Higher-order logic (HOL) [5, 6]. HOL is a classical logic with equality, based on typed total higher-order functions; the type discipline rules out paradoxes such as Russel s paradox in untyped set theory. As a term language, HOL is based on the typed λ-calculus i. e. the terms of HOL are λ-expressions. Types of terms may be built from type variables (like α, β,... ) or type constructors (like bool or nat). Type constructors may have arguments (as in α list or α set). The type constructor for the function space,, is written infix: α β; multiple applications like τ 1 (... (τ n τ n+1 )...) have the alternative syntax [τ 1,..., τ n ] τ n+1. HOL is centered around the extensional logical equality, _ = _ with type [α, α] bool, where bool is the fundamental logical type. We use infix notation: instead of (_ = _) E 1 E 2 we write E 1 = E 2. The logical connectives _ _, _ _, _ _ of HOL have type [bool, bool] bool, _ has type bool bool. The quantifiers _._ and _._ have type [α bool] bool; thus, quantifiers may range over types of higher order, i. e. functions. This core language can easily be extended in a logically-safe way by Cartesian products (written (a, b) of type α β), sets (with operators such as membership _ _ :: [α, α set] bool, the set comprehension {_._} :: (α bool) α set, _ _, _ _ :: [α set, α set] α set) and lists (with operators such as hd and tl and the concatenation _@_ :: [α list, α list] α list). The HOL library comprises a theory of maps to model partial functions. They are written as α β, which is a type synonym for α β option, where β option is a datatype consisting of the two elements None and Some β. Over those, the usual concepts of override _ ++ _ :: [α β, α β] α β, domain dom f and range ran f are introduced. B. The HOL-TestGen System HOL-TESTGEN is an interactive, i. e. semi-automated, test tool for specification-based tests built upon Isabelle/HOL. We briefly review main concepts and outline the standard workflow. The latter is divided into five phases: 1) writing the test theory, i. e. a collection of basic types and auxiliary functions formalizing the problem domain, 2) writing the test specification, TS, specifying the concrete property to be tested, 3) the test case generation phase, i. e. an automated conversion of TS into a sequence of test cases, TC, (or: partitions) representing classes of possible input, 4) the test data generation phase, where concrete members are constructed for the TC, and 5) the test execution phase where HOL-TESTGEN generates a test script driving the actual testing. Once a test theory is completed, documents can be generated that represent a formal test plan, including test theory, test specifications, configurations of the test data and test script generation commands. The plan may also include proofs for rules that support the overall process and can be processed either in batch mode or interactively, and optionally the results of the test execution. The core of the test case generation procedure lies in case splittings up to a certain depth for each free or universally quantified (input) variable in the test specification; depth and form of the case split depend on the type of the variable. The resulting test cases, TC i, have the form C 1 x C n x P (put x), where put is a place-holder for the program under test, x the input vector and P the oracle or postcondition telling that the output of put complies to the test specification. Test data generation from test cases boils down to a constraint resolution process finding an x satisfying the constraints C i. The reader interested in more details over theory and implementation is referred to [7, 8]. III. MODELING FIREWALLS IN HOL REVISITED In this section, we introduce our model of firewall policies and present a formal theory for them. For space limitations, however, we will restrict ourselves to the case of stateless firewalls, also called stateless packet filters. The model of stateful firewall policies is presented in [8]. A. A Formal Firewall Model A message from network A to network B is split into several packets that contain the content of the message and routing information. The routing information of a packet mainly contains its source and its destination address. A stateless firewall filters traffic passing from one network to another based on that routing information and the policy used. The policy describes which packets should be accepted and which should be rejected.

3 Internet (extern) Figure 1. DMZ A simple firewalling scenario. Intranet (intern) source destination protocol port action Internet DMZ smtp 25 accept Internet DMZ http 80 accept intranet DMZ smtp 25 accept DMZ intranet smtp 25 accept intranet DMZ imaps 993 accept intranet Internet http 80 accept any any any any deny Table I A SIMPLE FIREWALL POLICY Figure 1 illustrates a widely-used setup of a firewall, separating three networks: the external Internet, the internal network that has to be protected (intranet), and an intermediate network, the demilitarized zone (DMZ). The DMZ is usually used for servers (e. g. the Web server and the Mail server) that should be accessible both from the outside (Internet) and the from internal network (intranet) and thus are governed by a more relaxed policy than the intranet. Table I shows a firewall policy as it can be found in security textbooks. Such a policy description uses a first-fit matching strategy, i. e. the first match overrides later ones. For example, a packet from the Internet to the intranet is rejected (it only matches the last line of the table), whereas an smtp-packet from the intranet to the DMZ is accepted (third line of Table I). Lines in such a table are also called rules; together, they describe the policy of a firewall. We will use the terms policy and rules synonymously. 1) Packets and Networks: As a prerequisite, we need a formal model of packets and networks. As we do not want to depend on a specific representation of addresses, we introduce the abstract types (α :: adr) src and (α :: adr) dest for the source and destination address. Here, α :: adr restricts the types that can be used to instantiate α to members of the (unconstrained) type class adr. Further, we introduce β content for the content (payload) of a packet and id for the a unique identifier of a packet. The type of a packet can be defined as: types (α, β) packet = id (α::adr) src (α :: adr) dest β content (1) Further, we define projectors, e. g. getid, for accessing the components of a packet. We model networks, or just nets, as sets of sets of addresses, i. e. types α net = (α::adr) set set (2) For checking whether a given address is part of a network, we define the following operator: definition _ _ ::(α::adr) α net bool where a S s S. (a s) (3) 2) Address Representations: So far, we have left the concrete address format generic; our model allows different representations. Some of them were presented in [3]. Here, we concretize one possible address format, namely IPv4 addresses together with ports. In this setting, an address consists of a 32 bit number, represented as four-tuple of Integers, and a port. types ip = int int int int port = int ipv4 = ip port As we only model the transport layer, i. e., TCP/IP, we do not model application level protocols, e. g. http, explicitly. Overall, application level protocols are, on this level, only visible by the destination port, e. g., http packets usually have a destination port 80. 3) The Firewall Policy: From an abstract point of view, a policy is a partial function of packets to decisions, e. g. deny or accept labelled with translated input data. The datatype: datatype α out = accept α deny α (5) for decisions allows for modeling the modifications of return packets; thus, our model can capture address-translation techniques (such as network address translation (NAT)), realized by some firewalls, as well by providing suitable combinators. The type of a policy follows directly from this: types (α, β) policy = (α, β) packet ((α, β) packet) out where α β denotes partial functions (recall Section II-A). Moreover, the override operator for partial functions (_ ++ _) allows several rules to be combined to form a policy. For example, r 2 ++ r 1 combines the rules r 1 and r 2, where r 1 overrides (has higher precedence than) r 2. We can then define several rule combinators that substantially simplify the formalization of a concrete policy. For example, the usual catch-all rule for denying all traffic is expressed as: definition deny_all ::(α, β) policy where deny_all p Some(deny p) Many other combinators for restricting traffic based on a packet s source and destination can already be defined on this abstraction level. A rule allowing all packets coming from network s can be defined as definition allow_all_from::α net (α, β) policy where allow_all_from s Some(allow_all { p (getsrc p) s} ) where _ _ is the restriction operator on partial functions. B. Modeling a Policy Our abstract firewall model presented in the last section, allows for the direct formalization of the informal policy given (4) (6) (7) (8)

4 in Table I. First we have to define the subnets of type ipv4 net based on their IP address ranges, e. g.: { {((a, ) } } intranet b, c, d), p (a = 172) (b = 168) and { {((a, ) (a = 172) } } dmz b, c, d), p. (b = 16) (c = 70) We can then define the rules of our policy. Using the provided combinators, this can be done in a similar way to that used with many firewall configuration tools. The only slight difference is that in our scenario, the rules are treated backwards. The policy shown in Table I is represented in our combinator language as follows: definition Policy deny_all ++ allow_port_from_to intranet internet allow_port_from_to intranet dmz allow_port_from_to dmz intranet allow_port_from_to intranet dmz allow_port_from_to internet dmz allow_port_from_to internet dmz 25 C. Testing Stateless Firewalls: Direct Approach The test specification for the stateless firewall case is now within reach: we just state that the firewall under test (fut) has the same filtering function behavior as our policy: testspec test: fut x = Policy x (9) Usually, this test specification will be extended by predicates ensuring that only valid test data (e. g. no negative numbers in the IP addresses) will be generated, and that the content fields will be set to some default value content. Another predicate can ensure that only packets which cross network boundaries are considered. Applying our test case generation (recall Section II-B), we get 72 test cases. Among them are the following two, where the first is a packet meant to be rejected by the firewall, while the second one should be passed unchanged: 1) fut(12, ((7, 13, 12, 10), 6), ((172, 168, 2, 1), 80), content) = Some(deny(12, ((7, 13, 12, 10), 6), ((172, 168, 2, 1), 80) content)) 2) fut(8, ((172, 168, 12, 13), 12), ((172, 16, 70, 10), 25), content) = Some(accept(8, ((172, 168, 12, 13), 12), ((172, 16, 70, 10), 25), content)) The Some is a consequence of our representation of policies as partial functions, and means here that the mapping is defined for this packet. The test data could then be fed into a real firewall test driver. Overall, testing stateless packet filters is quite similar to classical unit testing of stateless software. IV. TRANSFORMING POLICIES Policy transformations are functions that map policies to policies. We decided to represent policy transformations as syntactic rules; this choice paves the way for expressing the entire normalization process inside HOL by functions manipulating abstract policy syntax. For the sake of conciseness, however, we will introduce only a few core combinators. datatype (α, β) Comb = DenyAll DenyFromTo α α AllowPort α α β Conc((α, β) Comb) ((α, β) Comb) (10) Moreover, we introduce the infix notation, _ _, for the constructor Conc. Next, we define a semantic interpretation, C, from syntactic combinators to the semantic ones presented in the previous section: fun C::(ipv4 net, port) Comb (ipv4, Content) Policy where C DenyAll = deny_all C (DenyFromTo x y) = deny_all_from_to x y C (AllowPort x y p) = allow_port_from_to x y p C (x y) = C x ++ C y (11) For the sake of simplicity, we fix here the address and content representation of a packet. However, the transformation works equally well for other representations. From these definitions follows a natural way to define and prove the correctness of a transformation. For example, the semantics of the following two policies is equivalent: lemma redundant_allowport: C (AllowPort x y p DenyFromTo x y) = C (DenyFromTo x y) (12) The proof essentially involves applying the semantic interpretation function and unfolding the definitions of the semantic operators. A. Elementary Transformation Rules A large collection of elementary policy transformation rules can be proved correct in a similar way. For example, we can show that a shadowed rule is redundant (Equation 13), the _ _ operator is associative (Equation 14), and, in many cases, commutativity holds (Equation 15-Equation 17): C (a DenyAll) = C DenyAll (13) C((a b) c) = C(a (b c)) (14) C(AllowPort x y a AllowPort x y b) = C(AllowPort x y b AllowPort x y a) C(DenyFromTo x y DenyFromTo u v) = C(DenyFromTo u v DenyFromTo x y) (15) (16) dom(c a) dom(c b) = {} = C(a b) = C(b a) (17)

5 B. Complex Transformation Rules Elementary rules can be organized to compute entire normal forms on policies. Instead of implementing these computations inside the prover (i. e. by a tactic program), we can define these functions entirely inside HOL, which gives us the possibility to prove their termination and completeness formally. In fact, we need nine such complex transformation rules for our normalization (see Section V). In our paper we will present just one in more detail, namely the sorting phase transformation; the interested reader is referred to the HOL-TESTGEN project page to see the complete proofs. The sorting phase is formalized as a function mapping combinator lists to combinator lists by sorting them according to the following principles: If there is a DenyAll, it should be at the first place. Rules dealing with the same set of networks should be grouped together, with the DenyFromTo s coming before the AllowPort s. The semantic correctness of this transformation holds only under certain conditions that have to be established by previous phases of the normalization. The sorting function itself is a slightly adapted version of a standard function from the Isabelle library. The ordering relation however, has to be defined appropriately according to our problem domain: fun fun insort where insort a l [] = [a] insort a l (x#xs) = if smaller a x l then a#x#xs else x#(insort a l xs) sort where sort l [] = [] sort l (x#xs) = insort x l (sort l xs) fun(sequential) smaller where smaller DenyAll x l = true smaller x DenyAll l = false smaller x y l = (x = y) if bothnet x = bothnet y then case y of DenyFromTo a b x = DenyFromTo b a _ true else pos (bothnet x) l pos(bothnet y) l) (18) (19) (20) Here, bothnet returns the set of the source and destination network of a rule, and pos returns the position of an element within a list. The variable l is a list of network sets. The ordering of this list determines which group of rules is treated as smaller than another. According to the requirements given to the smaller relation, the concrete ordering of this list is irrelevant. However, we will usually need the requirement that all the sets of network pairs of a policy are in this list. This requirement is formalized in a predicate called all_in_list. First, we have to provide a proof that after applying sort using this smaller relation, we will get a sorted list. The main prerequisites for this proof are that the relation is transitive, reflexive, and antisymmetric. This is true as long as all the network pairs that appear in the policy are in the list l. Next, we have to prove that this transformation is semanticspreserving. We make the following assumptions about the input policy: singlecomb: The policy is given as a list of single rules. allnetsdistinct: All the networks are either equal or disjoint. wellformed_policy1: There is exactly one DenyAll and it is at the first position. wellformed_policy3: The domain of an AllowPort rule is disjoint from all the rules appearing on the right of it. In the next section, we show that these conditions do always hold at that specific point in our normalization algorithm. To facilitate the proofs, we further define a matching function that returns Some r for the first rule r in a policy p that matches packet x and None otherwise. fun mr_rev where mr_rev a (x#xs) = if a dom(c x) then (Some x) else (mr_rev a xs) mr_rev a [ ] = None definition matching_rule where matching_rule a x mr_rev a (rev x) (21) (22) To prove our main theorem, the semantic correctness of sort, we apply an indirect approach. We show that for all packets x, and for all policies p and s that satisfy the conditions listed above, and that have the same set of rules (but not necessarily in the same order), the first rule that matches x in p is the same as in s. If we can additionally prove that the sorting function preserves these conditions, we can establish the main theorem: lemma C_eq_Sets_mr: assumes sets_eq: set p = set s and wp1_p: wellformed_policy1 p and wp1_s: wellformed_policy1 s and wp3_p: wellformed_policy3 p and wp3_s: wellformed_policy3 s and and: allnetsdistinct p and SC: singlecomb p shows matching_rule x p = matching_rule x s a) Proof Sketch.: A case distinction over matching_rule x p results in two cases: this expression can either be None or Some y: 1) None. This case is shown by contradiction. As there is a DenyAll which matches all packets, the matching rule of x cannot be None. 2) Some y. This is shown by case distinction on y, i. e. on the matching rule. By our definition of the Comb datatype, there are four possibilities: DenyAll: If the matching rule is DenyAll, there is no other rule in p which matches, as it is necessarily the last considered rule. Thus, as the two sets are equal, there is no other rule in s that matches either. As

6 DenyAll is in s, this has to be the matching rule in s. DenyFromTo a b: If this is the matching rule in p, there cannot be another rule in p that matches: as the networks are disjoint and the only DenyAll is the last considered rule, the only possibility is an AllowPort a b c, for some c. However, due to wellformed_policy3, such a rule can only be on the right of the matching rule as their domains are not disjoint. But if it were on the right, the allow-rule would be the matching rule. Thus there is no such rule. Since such a rule does not exist in p, it does not exist in s either. As DenyFromTo a b is in s, this has to be the matching rule in s. AllowPort a b c: This sub-proof is very similar: The only alternative rule which could match is the corresponding DenyFromTo a b, but if this rule appears on the right of the matching rule, this would contradict the wellformedness conditions. Therefore, this has to be the matching rule also in s. a b: This case is ruled out by the wellformedness conditions. The formal proof of this lemma can be found in the appendix. Our main correctness theorem of the sorting phase is presented as follows: lemma C_eq_sorted: assumes ail: all_in_list p l and wp1: wellformed_policy1 p and wp3: wellformed_policy3 p and and: allnetsdistinct p and SC: singlecomb p shows C (list2policy(sort l p)) = C(list2policy p) We thus have a sorting algorithm for policies that is proven to be semantics-preserving given that some well-specified conditions hold for the input policy. V. NORMALIZING POLICIES The sorting phase is only one part of the full normalization, which is organized into nine phases in total. We impose the following two restrictions on the input policies: Each policy must contain a DenyAll rule. If this restriction were to be lifted, the insertdenies phase would have to be adjusted accordingly. For each pair of networks n 1 and n 2, the networks are either disjoint or equal. If this restriction were to be lifted, we would need some additional phases before the start of the normalization procedure presented below. This rule would split single rules into several by splitting up the networks such that they are all pairwise disjoint or equal. Such a transformation is clearly semantics-preserving and the condition would hold after these phases. As a result, the procedure generates a list of policies, in which: each element of the list contains a policy which completely specifies the blocking behavior between two networks, and there are no shadowed rules. This result is desirable since the test case generation for rules between networks A and B is independent of the rules that specify the behavior for traffic flowing between networks C and D. Thus, the different segments of the policy can be processed individually. The normalization procedure does not aim to minimize the number of rules. While it does remove unnecessary ones, it also adds new ones, enabling a policy to be split into several independent parts. The full procedure can be written as follows: definition normalize p (removeallduplicates insertdenies separate (sort (Nets_List p)) removeshadowrules2 remdups removeshadowrules3 removeshadowrules1 policy2list) p (23) The normalization procedure consists of nine transformation functions that are processed in sequence. In the following, we discuss the nine phases and their preconditions in more detail. These preconditions are necessary to establish the correctness theorem for the overall procedure: theorem C_eq_normalize: assumes a1: member DenyAll p and a2: allnetsdistinct p shows C(list2policy(normalize p)) = C p The proof of this theorem combines the local correctness results of the single phases (e. g. the sorting phase result described in the previous section) while discharging their preconditions using invariance properties of the previous phases. The nine phases are: 1) policy2list: transforms a policy into a list of single rules. The result does not contain policies composed via _ _, i. e. the property singlecomb is established. 2) removeshadowrules1: removes all the rules that appear in front of a DenyAll. The transformation preserves singlecomb and establishes wellformed_policy1, stating that there is a DenyAll in front of the policy. 3) removeshadowrules3: removes all rules with an empty domain; they never match any packet. It maintains all previous invariants and does not establish any required new one. 4) remdups: removes duplicate rules. Only the last one of the list remains. As policies are evaluated from right to left, it can easily be shown that this transformation preserves the semantics. 5) removeshadowrules2: removes all rules allowing the traffic on a specific port between two networks, where an earlier rule already denies all the traffic between them. This function maintains the earlier invariants, and establishes wellformed_policy3, the invariant necessary for the sorting function to be correct. It ensures that the domain of an AllowPort rule is disjoint from all the rules appearing on the right of it. 6) sort: maintains (see previous section) the previous invariants and, besides the sorted invariant, also establishes an

7 important new one: the rules are grouped according to the two networks they consider. As already mentioned, the order of the grouped rules is considered to be irrelevant to correctness. However, a user-defined ordering might give room for further optimizations. This can be done very easily by stating manually a list with sets of network pairs. All properties and side-conditions are still valid as long as we can prove that this list contains all the sets of network pairs appearing in the policy. 7) separate: transforms the list of single combinators into a list of policies. Each of those policies contains all the rules between two networks (in both directions). While singlecomb is invalidated by this transformation, all the others are maintained. We do get two important additional properties: OnlyTwoNets: Each policy treats at most two different networks. separated: The domains of the policies are pairwise disjoint (except from DenyAll). This follows from the fact that the rules were already grouped. 8) insertdenies: is the only phase where additional rules are inserted. In front of each policy, we add the two rules denying all traffic between those two networks in both directions. As we add new rules here, the proof of semantic equivalence is relatively involved. The main part consists in proving that separated is maintained with this transformation. This phase is only semanticspreserving because of the initial requirement that the policy has a DenyAll. Only after this phase, the traffic between two networks is characterized completely by the corresponding policy. 9) removeallduplicates: removes superfluous duplicate DenyFromTo s introduced by the previous phase. After the last phase, we get a list of policies that satisfies the requirements stated in the beginning of this section. Using the correctness of the phases, it is straightforward to prove semantic equivalence of the full procedure. The individual elements of the returned list are policies on their own and can be processed individually by HOL-TESTGEN. Thus, the set of test cases for the full policy is decomposed into the set of the test cases of all the smaller policies. A. An Example In the following we show the effect of the normalization procedure on our small example policy. The original policy contains 7 rules restricting the traffic between three networks: definition Policy DenyAll AllowPort intranet internet 80 AllowPort intranet dmz 993 AllowPort dmz intranet 25 AllowPort intranet dmz 25 AllowPort internet dmz 80 AllowPort internet dmz 25 After applying the normalization procedure, we get: number of test cases R 1 ETH 3 ETH 2 ETH 1 unnormalized policy R 7 R 6 R 5 R 4 R 3 R 2 normalized policy R 10 R 9 R 8 Figure 2. The normalization of policies decreases the number of test cases by several orders of magnitude. 1) DenyAll 2) DenyFromTo intranet internet DenyFromTo internet intranet AllowPort intranet internet 80 3) DenyFromTo intranet dmz DenyFromTo dmz intranet AllowPort intranet dmz 993 AllowPort dmz intranet 25 AllowPort intranet dmz 25 4) DenyFromTo internet dmz DenyFromTo dmz internet AllowPort internet dmz 80 AllowPort internet dmz 25 Now, there are four policies with a total of 13 rules. The number of generated test cases shrinks from 92 to 17, the time required to generate them from 40 to about 2 seconds. It is important to note that in general we do not generate a policy for those partitions which do not have a rule in the initial policy. They are treated only by the catch-all rule. This might easily be changed if that turned out to be useful - either by adjusting the insertdenies phase or by adding a new phase right after that one. VI. EMPIRICAL RESULTS In this section, we report on several case studies that show the benefit of policy normalization with respect to both the number of test cases generated and the runtime required for generating those test cases. In a first experiment, we explored the impact of policy normalization on the overall time required for generating test cases (see Table II) on both policies that are actually used at ETH Zürich and randomly generated ones. The most important result is that while the overall number of rules can increase during normalization, the overall time required for generating test cases is significantly smaller after normalization, even if we include the time needed for normalization. While for some policies, the test case generation took more than 24 hours, the required time for normalizing the policy and generating test cases for the normalized policy is only a few seconds. The overall increase in the number of rules can be explained by the fact that during normalization, segment-specific deny rules need to be inserted. The significant reduction of test

8 ETH 1 ETH 2 ETH 3 R1 R2 R3 R4 R5 R6 R7 R8 R9 R10 Not Normalized Networks Rules TC Generation Time (sec) >24h >24h 8 >24h Test Cases Normalized Rules Segments Normalization (sec) TC Generation Time (sec) Test Cases Table II TEST CASE GENERATION FOR FIREWALL POLICIES UTILIZING NORMALIZATION. number of rules (normalized) number of rules (unnormalized) 5 networks 10 networks 25 networks Figure 3. The size (number of rules) of a policy after normalization increases with both the number of rules in the unnormalized policy and the number of networks. case generation time can be explained by the fact that after segmentation, each segment specific policy is much smaller and less complex. As the normalization of policies reduces the number of test cases significantly (see Figure 2), the time needed for executing a test on an implementation is also reduced substantially. The generation of test cases for larger policies in reasonable time, is only possible after normalization. Thus, we investigated the effect of normalization in isolation. Table III shows the normalization results for randomly generated policies with different sizes both in the number of rules and the number of networks covered (see also Figure 3). All policies start with a DenyAll rule and one in every five rules is a DenyFromTo. If the number of rules is small related to the number of networks, the number of rules after normalization increases quite significantly as there are a lot of additional DenyFromTo s to be inserted. In the opposite case, it decreases a lot, as many of those rules will be removed during normalization. The time needed for the normalization primarily depends upon the number of networks and on the number of rules. We also generated test cases for one segment (i. e. a normalized policy between exactly two networks) in isolation: the test case generation for a policy with 50 rules only takes about 3 minutes and more than 100 rules can still be processed in less than an hour. Thus, test case generation for very large policies seems to be feasible, even though policy normalization can increase the overall number of rules. A. Related Work VII. CONCLUSION AND RELATED WORK Several approaches for specification-based testing of firewalls have been proposed. El-Atawy et al. [9, 10] present a policy segmentation technique. They also give some measurements to the segments such that important segments can be tested more rigorously. Jürjens and Wimmel [11] propose a specification-based testing of firewalls that employs a formal model of the network and automatically derives test cases. Unfortunately, the test case generation technique is not really described, and the tested configurations appear small. Apparently, it does not apply any policy transformation technique. Bishop et al. [12] describe a formal model of protocols in HOL. However, their level of abstraction is much lower than ours; therefore, it is much less suited for testing of policy conformance. Marmorstein and Kearns [13] propose a policybased host classification which can be used to detect errors and anomalies in a firewall policy. A common feature of all these approaches is, that they do not address the transformation of the specification, i. e. the policy. In contrast, transforming security policies, e. g. ones based on XACML [14], to improve their overall runtime performance is a well-known technique [15, 16]. This approach also been extended to other policy languages. In particular, Liu et al. [16] present algorithms based on decision-diagrams, that minimize the number of rules of a firewall policy. We are not aware of any attempt to formally verify the correctness of the policy transformation technique. Dssouli et al. [17] have already introduced a notion of testability for communication protocols using a specification based on finite state machines. They present a method for designing communication protocols that are easy to test. The closest related work is that of Harman et al. [18], which is further developed in, e. g. [19 21]. They introduce the concept of testability transformations, i. e. source-to-source transformations of programs that increase their testability. Similar to our work, the goal of these transformations is minimization of the test cases required to achieve full test coverage (with respect to a given test adequacy criterion). While their work is based on transformation of the source code, i. e. the system under test, we transform a formal specification, which makes

9 Rules Networks Partitions Rules Average Time[s] Table III THE SIZE OF A NORMALIZED POLICY MAINLY DEPENDS ON THE NUMBER OF RULES IN RELATION TO THE NUMBER OF NETWORKS. our approach applicable in black-box testing scenarios. Moreover, we provide a uniform, tool-supported approach for formally analyzing and transforming a test-specification, and generating test cases for an implementation. And last but not least, our approach is based on a formal proof that the applied testability transformation preserves semantics. B. Conclusion and Future Work Harman [20] discusses a list of open problems in testability transformations. With our work, we make a significant contribution to the final problem in his list: testability transformations for specification-based testing. In particular, we have presented a testability translation for model-based generation of test cases for firewalls. Moreover, we proved formally the correctness, i. e. semantics preservation, of transformations within the same framework used for test case generation. In HOL-TESTGEN/FW, we believe we have developed the first domain-specific test tool to integrate the specification, formal analysis, transformation, and test case generation of firewall policies. Besides applying test case generation to other kind of security domains, e. g. [22], we see several productive lines of future work. In [8], we used sequence testing techniques for testing stateful firewalls using HOL-TESTGEN. On the theoretical side, developing formal testability transformations for sequence testing seems to be particularly appealing. This work would address the second to last problem of [20]: testability transformations for specifications based on finite-state machines. Moreover, considering testability transformations that do not preserve the semantics of the specifications, as suggested by Harman et al. [21], requires the development of new test hypotheses. Here, the integrated approach of HOL-TESTGEN allows for the formal computation and analysis of such hypotheses. Finally, the relation between testability transformation and fault models needs to be investigated further. On the practical side, several extensions are envisaged: first, our integrated test-harness generator could be configured for generating test data in a format that is suitable for packet injection tools. This would allow for testing the conformance of deployed firewalls. Second, following modeldriven approaches, e. g. [23], our policy specification can be used for generating configurations of different firewall implementations. This would allow the use of HOL-TESTGEN/FW for testing, optimization (both with respect of testability and performance), and configuration of real firewalls. And thirdly, integration of HOL-TESTGEN/FW with standard firewall configuration tools would increase their appeal to end-users. Like the second approach, this would allow a policy specification language to be used for test and configuration of a real firewall. REFERENCES [1] Securing cyberspace for the 44th presidency, Center for Strategic and International Studies (CSIS), Tech. Rep., [2] Misconfigured router causes increased BGP traffic and isolated outages for internet services, com/security/center/viewalert.x?alertid=17657, [3] A. D. Brucker, L. Brügger, and B. Wolff, Model-based firewall conformance testing, in Testcom/FATES 2008, ser. LNCS, K. Suzuki and T. Higashino, Eds. Springer-Verlag, 2008, no. 5047, pp [4] T. Nipkow, L. C. Paulson, and M. Wenzel, Isabelle/HOL A Proof Assistant for Higher-Order Logic, ser. LNCS. Springer-Verlag, 2002, vol [5] A. Church, A formulation of the simple theory of types, Journal of Symbolic Logic, vol. 5, no. 2, pp , [6] P. B. Andrews, Introduction to Mathematical Logic and Type Theory: To Truth through Proof, 2nd ed. Kluwer Academic Publishers, [7] A. D. Brucker and B. Wolff, Symbolic test case generation for primitive recursive functions, in Formal Approaches to Testing of Software, ser. LNCS, J. Grabowski and B. Nielsen, Eds. Springer-Verlag, 2004, no. 3395, pp [8], Test-sequence generation with HOL-TESTGEN with an application to firewall testing, in TAP 2007: Tests And Proofs, ser. LNCS, B. Meyer and Y. Gurevich, Eds. Springer-Verlag, 2007, no. 4454, pp [9] A. El-Atawy, K. Ibrahim, H. Hamed, and E. Al-Shaer, Policy segmentation for intelligent firewall testing, in NPSec 05. IEEE Computer Society, 2005, pp [10] A. El-Atawy, T. Samak, Z. Wali, E. Al-Shaer, F. Lin, C. Pham, and S. Li, An automated framework for validating firewall policy enforcement, in POLICY 07. IEEE Computer Society, 2007, pp [11] J. Jürjens and G. Wimmel, Specification-based testing of firewalls, in Ershov Memorial Conference, ser. LNCS, D. Bjørner, M. Broy, and A. V. Zamulin, Eds., vol Springer-Verlag, 2001, pp [12] S. Bishop, M. Fairbairn, M. Norrish, P. Sewell, M. Smith, and K. Wansbrough, Engineering with logic: HOL spec-

10 ification and symbolic-evaluation testing for TCP implementations, in POPL, J. G. Morrisett and S. L. P. Jones, Eds. ACM Press, 2006, pp [13] R. Marmorstein and P. Kearns, Firewall analysis with policy-based host classification, in LISA. USENIX Association, 2006, pp [14] extensible Access Control Markup Language (XACML), version 2.0, [Online]. Available: 0-OS-NORMATIVE.zip [15] P. Miseldine, Automated XACML policy reconfiguration for evaluation optimisation, in Software Engineering for Secure Systems (SESS), B. D. Win, S.-W. Lee, and M. Monga, Eds. ACM Press, 2008, pp [16] A. X. Liu, E. Torng, and C. Meiners, Firewall compressor: An algorithm for minimizing firewall policies, in IEEE Conference on Computer Communications (Infocom), [17] R. Dssouli, K. Karoui, K. Saleh, and O. Cherkaoui, Communications software design for testability: specification transformations and testability measures, Information and Software Technology, vol. 41, no , pp , [18] M. Harman, L. Hu, R. Hierons, J. Wegener, H. Sthamer, A. Baresel, and M. Roper, Testability transformation, IEEE Trans. Softw. Eng., vol. 30, no. 1, pp. 3 16, [19] R. M. Hierons, M. Harman, and C. Fox, Branchcoverage testability transformation for unstructured programs, Comput. J., vol. 48, no. 4, pp , [20] M. Harman, Open problems in testability transformation, in Software Testing Verification and Validation Workshop (ICSTW), 2008, pp [21] M. Harman, A. Baresel, D. Binkley, R. M. Hierons, L. Hu, B. Korel, P. McMinn, and M. Roper, Testability transformation - program transformation to improve testability, in Formal Methods and Testing, ser. LNCS, R. M. Hierons, J. P. Bowen, and M. Harman, Eds., vol Springer-Verlag, 2008, pp [22] A. D. Brucker and B. Wolff, A verification approach for applied system security, International Journal on Software Tools for Technology Transfer (STTT), vol. 7, no. 3, pp , [23] A. D. Brucker, J. Doser, and B. Wolff, An MDA framework supporting OCL, Electronic Communications of the EASST, vol. 5, APPENDIX theorem C_eq_Sets_mr: assumes sets_eq: " set p = set s" and SC: "singlecomb p" and wp1_p: "wellformed_policy1_new p" and wp1_s: "wellformed_policy1_new s" and wp3_p: "wellformed_policy3 p" and wp3_s: "wellformed_policy3 s" and and: " allnetsdistinct p" shows "matching_rule x p = matching_rule x s" proof ( cases "matching_rule x p") case None have DA: "DenyAll set p" using wp1_p by (auto simp: wp1_aux1aa) have notda: "DenyAll / set p" using None by (auto simp: DAimplieMR) thus? thesis using DA by (contradiction ) next case (Some y) thus? thesis proof ( cases y) have tl_p : "p = DenyAll#(tl p)" by (metis wp1_p wp1n_tl) have tl_s : "s = DenyAll#(tl s)" by (metis wp1_s wp1n_tl) have tl_eq : " set ( tl p) = set ( tl s)" by(metis tl.simps(2) WP1n_DA_notinSet foo2 mem_def sets_eq wellformed_policy1_charn wp1_aux1aa wp1_eq wp1_p wp1_s) { case DenyAll have mr_p_is_denyall: "matching_rule x p = Some DenyAll" by (simp add: DenyAll Some) hence x_notin_tl_p : " r. r set ( tl p) x / dom (C r)" using wp1_p by (auto simp: mrdenyall_is_unique) hence x_notin_tl_s : " r. r set ( tl s) x / dom (C r)" using tl_eq by auto hence mr_s_is_denyall: "matching_rule x s = Some DenyAll" using tl_s by (auto simp: mr_first ) thus? thesis using mr_p_is_denyall by simp }{ case (DenyFromTo a b) have mr_p_is_daft: "matching_rule x p = Some (DenyFromTo a b)" by (simp add: DenyFromTo Some) have DA_notin_tl: "DenyAll / set ( tl p)" by (metis WP1n_DA_notinSet wp1_p) have mr_tl_p: "matching_rule x p = matching_rule x ( tl p)" by (metis Comb.simps(1) DenyFromTo Some mrconcend tl_p) have dom_tl_p: " r. r set ( tl p) x dom (C r) = r = (DenyFromTo a b)" using wp1_p and SC wp3_p mr_p_is_daft by (auto simp: rule_charndaft) hence dom_tl_s: " r. r set ( tl s) x dom (C r) = r = (DenyFromTo a b)" using tl_eq by auto have DAFT_in_tl_s: "DenyFromTo a b set ( tl s)" using mr_tl_p by (metis DenyFromTo mrset mr_p_is_daft tl_eq) have x_in_dom_daft: "x dom (C (DenyFromTo a b))" by (metis mr_p_is_daft DenyFromTo mr_in_dom) hence mr_tl_s_is_daft: "matching_rule x ( tl s) = Some (DenyFromTo a b)" using DAFT_in_tl_s dom_tl_s by (auto simp: mr_charn) hence mr_s_is_daft: "matching_rule x s = Some (DenyFromTo a b)" using tl_s by (metis DA_notin_tl DenyFromTo EX_MR mrda_tl mr_p_is_daft not_some_eq tl_eq wellformed_policy1_new.simps(2)) thus? thesis using mr_p_is_daft by simp }{ case (AllowPort a b c) have wp1s: "wellformed_policy1 s" by (metis wp1_eq wp1_s) have mr_p_is_a: "matching_rule x p = Some (AllowPort a b c)" by (simp add: AllowPort Some) hence A_in_s: "AllowPort a b c set s" using sets_eq by (auto intro : mrset) have x_in_dom_a: "x dom (C (AllowPort a b c))" by (metis mr_p_is_a AllowPort mr_in_dom) have SCs: "singlecomb s" using SC sets_eq by (auto intro : SCSubset) hence ANDs: " allnetsdistinct s" using and sets_eq SC by (auto intro : andsetseq) hence mr_s_is_a: "matching_rule x s = Some (AllowPort a b c)" using A_in_s wp1s mr_p_is_a and SCs wp3_s x_in_dom_a by (simp add: rule_charn2 ) thus? thesis using mr_p_is_a by simp } case (Conc a b) thus? thesis by (metis Some mr_not_conc SC) qed qed

HOL-TestGen/fw An Environment for Specification-Based Firewall Conformance Testing

HOL-TestGen/fw An Environment for Specification-Based Firewall Conformance Testing HOL-TestGen/fw An Environment for Specification-Based Firewall Conformance Testing Achim D. Brucker 1, Lukas Brügger 2, and Burkhart Wolff 3 1 SAP AG, Vincenz-Priessnitz-Str. 1, 76131 Karlsruhe, Germany

More information

Model-based Firewall Conformance Testing

Model-based Firewall Conformance Testing Model-based Firewall Conformance Testing Achim D. Brucker, 1 Lukas Brügger, 2 and Burkhart Wolff 3 1 SAP Research, Vincenz-Priessnitz-Str. 1, 76131 Karlsruhe, Germany achim.brucker@sap.com 2 Information

More information

Formal firewall conformance testing: an application of test and proof techniques

Formal firewall conformance testing: an application of test and proof techniques SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2014; 00:1 38 Published online in Wiley InterScience (www.interscience.wiley.com). Formal firewall conformance testing: an application

More information

Deterministic Discrete Modeling

Deterministic Discrete Modeling Deterministic Discrete Modeling Formal Semantics of Firewalls in Isabelle/HOL Cornelius Diekmann, M.Sc. Dr. Heiko Niedermayer Prof. Dr.-Ing. Georg Carle Lehrstuhl für Netzarchitekturen und Netzdienste

More information

Firewall Verification and Redundancy Checking are Equivalent

Firewall Verification and Redundancy Checking are Equivalent Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin acharya@cs.utexas.edu M. G. Gouda National Science Foundation University of Texas at Austin mgouda@nsf.gov

More information

Formal Firewall Conformance Testing: An Application of Test and Proof Techniques

Formal Firewall Conformance Testing: An Application of Test and Proof Techniques SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2014; 00:1 40 Published online in Wiley InterScience (www.interscience.wiley.com). Formal Firewall Conformance Testing: An Application

More information

Model-based Security Testing of a Health-Care System Architecture:

Model-based Security Testing of a Health-Care System Architecture: Model-based Security Testing of a Health-Care System Architecture: A Case Study Achim Brucker (SAP), Lukas Brügger (ETH), Paul Kearney(BT) and Burkhart Wolff* *Université Paris-Sud, Laboratoire de Recherche

More information

Management of Exceptions on Access Control Policies

Management of Exceptions on Access Control Policies Management of Exceptions on Access Control Policies J. G. Alfaro 1,2, F. Cuppens 1, and N. Cuppens-Boulahia 1 1 GET/ENST-Bretagne, 35576 Cesson Sévigné - France, {frederic.cuppens,nora.cuppens}@enst-bretagne.fr

More information

Firewall Policy Anomalies- Detection and Resolution

Firewall Policy Anomalies- Detection and Resolution Firewall Policy Anomalies- Detection and Resolution Jitha C K #1, Sreekesh Namboodiri *2 #1 MTech student(cse),mes College of Engineering,Kuttippuram,India #2 Assistant Professor(CSE),MES College of Engineering,Kuttippuram,India

More information

CHAPTER 7 GENERAL PROOF SYSTEMS

CHAPTER 7 GENERAL PROOF SYSTEMS CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes

More information

Verifying security protocols using theorem provers

Verifying security protocols using theorem provers 1562 2007 79-86 79 Verifying security protocols using theorem provers Miki Tanaka National Institute of Information and Communications Technology Koganei, Tokyo 184-8795, Japan Email: miki.tanaka@nict.go.jp

More information

Efficiently Managing Firewall Conflicting Policies

Efficiently Managing Firewall Conflicting Policies Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering

More information

Optimization of Firewall Filtering Rules by a Thorough Rewriting

Optimization of Firewall Filtering Rules by a Thorough Rewriting LANOMS 2005-4th Latin American Network Operations and Management Symposium 77 Optimization of Firewall Filtering Rules by a Thorough Rewriting Yi Zhang 1 Yong Zhang 2 and Weinong Wang 3 1, 2, 3 Department

More information

debugging a firewall policy mapping

debugging a firewall policy mapping R O B E R T M A R M O R S T E I N A N D P H I L K E A R N S debugging a firewall policy with policy mapping Robert Marmorstein will graduate from the College of William and Mary this summer with a Ph.D.

More information

Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC.

Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC. VYATTA, INC. Vyatta System Firewall REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

A Framework for the Semantics of Behavioral Contracts

A Framework for the Semantics of Behavioral Contracts A Framework for the Semantics of Behavioral Contracts Ashley McNeile Metamaxim Ltd, 48 Brunswick Gardens, London W8 4AN, UK ashley.mcneile@metamaxim.com Abstract. Contracts have proved a powerful concept

More information

Firewall implementation and testing

Firewall implementation and testing Firewall implementation and testing Patrik Ragnarsson, Niclas Gustafsson E-mail: ragpa737@student.liu.se, nicgu594@student.liu.se Supervisor: David Byers, davby@ida.liu.se Project Report for Information

More information

A Model of Stateful Firewalls and its Properties

A Model of Stateful Firewalls and its Properties A Model of Stateful Firewalls and its Properties Mohamed G. Gouda and Alex X. Liu 1 Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-1188, U.S.A. Email: {gouda, alex}@cs.utexas.edu

More information

Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain

Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain Kamarasa V D S Santhosh M.Tech Student, Department of ComputerScience & Engineering, School of Technology, Gitam University,

More information

Firewalls. Ahmad Almulhem March 10, 2012

Firewalls. Ahmad Almulhem March 10, 2012 Firewalls Ahmad Almulhem March 10, 2012 1 Outline Firewalls The Need for Firewalls Firewall Characteristics Types of Firewalls Firewall Basing Firewall Configurations Firewall Policies and Anomalies 2

More information

Design and Implementation of Firewall Policy Advisor Tools

Design and Implementation of Firewall Policy Advisor Tools Design and Implementation of Firewall Policy Advisor Tools Ehab S. Al-Shaer and Hazem H. Hamed Multimedia Networking Research Laboratory School of Computer Science, Telecommunications and Information Systems

More information

Accessing Private Network via Firewall Based On Preset Threshold Value

Accessing Private Network via Firewall Based On Preset Threshold Value IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold

More information

20% more formulas. Verified Firewall Ruleset Verification. Now with. with Isabelle/HOL. Cornelius Diekmann

20% more formulas. Verified Firewall Ruleset Verification. Now with. with Isabelle/HOL. Cornelius Diekmann Verified Firewall Ruleset Verification with Isabelle/HOL Cornelius Diekmann Now with 20% more formulas 1 Introduction to Firewalls Chain INPUT (policy CCEPT) target prot source destination DOS_PROTECT

More information

Firewall Design Principles

Firewall Design Principles Firewall Design Principles Software Engineering 4C03 Dr. Krishnan Stephen Woodall, April 6 th, 2004 Firewall Design Principles Stephen Woodall Introduction A network security domain is a contiguous region

More information

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,

More information

DMZ Network Visibility with Wireshark June 15, 2010

DMZ Network Visibility with Wireshark June 15, 2010 DMZ Network Visibility with Wireshark June 15, 2010 Ashok Desai Senior Network Specialist Intel Information Technology SHARKFEST 10 Stanford University June 14-17, 2010 Outline Presentation Objective DMZ

More information

Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC.

Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC. VYATTA, INC. Vyatta System Firewall REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and

More information

Unified Language for Network Security Policy Implementation

Unified Language for Network Security Policy Implementation Unified Language for Network Security Policy Implementation Dmitry Chernyavskiy Information Security Faculty National Research Nuclear University MEPhI Moscow, Russia milnat2004@yahoo.co.uk Natalia Miloslavskaya

More information

Guardian Digital WebTool Firewall HOWTO. by Pete O Hara

Guardian Digital WebTool Firewall HOWTO. by Pete O Hara Guardian Digital WebTool Firewall HOWTO by Pete O Hara Guardian Digital WebTool Firewall HOWTO by by Pete O Hara Revision History Revision $Revision: 1.1 $ $Date: 2006/01/03 17:25:17 $ Revised by: pjo

More information

An Approach for improving Network Performance using Cross-Domain Cooperative Secrecy-Maintaining Firewall Optimization

An Approach for improving Network Performance using Cross-Domain Cooperative Secrecy-Maintaining Firewall Optimization An Approach for improving Network Performance using Cross-Domain Cooperative Secrecy-Maintaining Firewall Optimization Yogita Nikhare 1 andprof. Anil Bende 2 1 M.TechScholar, Department of Computer Science

More information

[Refer Slide Time: 05:10]

[Refer Slide Time: 05:10] Principles of Programming Languages Prof: S. Arun Kumar Department of Computer Science and Engineering Indian Institute of Technology Delhi Lecture no 7 Lecture Title: Syntactic Classes Welcome to lecture

More information

ACL Based Dynamic Network Reachability in Cross Domain

ACL Based Dynamic Network Reachability in Cross Domain South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer

More information

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006 CSE331: Introduction to Networks and Security Lecture 12 Fall 2006 Announcements Midterm I will be held Friday, Oct. 6th. True/False Multiple Choice Calculation Short answer Short essay Project 2 is on

More information

Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February-2015. Version 1.

Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February-2015. Version 1. Supporting Document Mandatory Technical Document Evaluation Activities for Stateful Traffic Filter Firewalls cpp February-2015 Version 1.0 CCDB-2015-01-002 Foreword This is a supporting document, intended

More information

Interactive Software Verification

Interactive Software Verification Interactive Software Verification Spring Term 2013 Holger Gast gasth@in.tum.de 25.6.2013 1 H.Gast gasth@in.tum.de Interactive Software Verification, 25.6.2013 Today Manipulating lists on the heap Ghost

More information

Verifying Semantic of System Composition for an Aspect-Oriented Approach

Verifying Semantic of System Composition for an Aspect-Oriented Approach 2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach

More information

A1.1.1.11.1.1.2 1.1.1.3S B

A1.1.1.11.1.1.2 1.1.1.3S B CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security

More information

Methods for Firewall Policy Detection and Prevention

Methods for Firewall Policy Detection and Prevention Methods for Firewall Policy Detection and Prevention Hemkumar D Asst Professor Dept. of Computer science and Engineering Sharda University, Greater Noida NCR Mohit Chugh B.tech (Information Technology)

More information

INTRODUCTION TO FIREWALL SECURITY

INTRODUCTION TO FIREWALL SECURITY INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ

More information

Set Up a VM-Series Firewall on the Citrix SDX Server

Set Up a VM-Series Firewall on the Citrix SDX Server Set Up a VM-Series Firewall on the Citrix SDX Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa

More information

ECE 578 Term Paper Network Security through IP packet Filtering

ECE 578 Term Paper Network Security through IP packet Filtering ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon

More information

Firewalls 1 / 43. Firewalls

Firewalls 1 / 43. Firewalls What s a Firewall Why Use? Tradttional by Analogy Should We Fix the Network Protocols Instead? Firewall Advantages Schematic of a Firewall Conceptual Pieces The DMZ Positioning Why Administrative Domains?

More information

Configuring Firewalls An XML-based Approach to Modelling and Implementing Firewall Configurations

Configuring Firewalls An XML-based Approach to Modelling and Implementing Firewall Configurations Configuring Firewalls An XML-based Approach to Modelling and Implementing Firewall Configurations Simon R. Chudley and Ulrich Ultes-Nitsche Department of Electronics and Computer Science, University of

More information

The CVS-Server Case Study: A Formalized Security Architecture

The CVS-Server Case Study: A Formalized Security Architecture The CVS-Server Case Study: A Formalized Security Architecture Extended Abstract Achim D. Brucker, Frank Rittinger, and Burkhart Wolff {brucker,rittinge,wolff}@informatik.uni-freiburg.de 1 Introduction

More information

SERVING as the first line of defense against malicious

SERVING as the first line of defense against malicious IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 9, NO. 1, MARCH 2012 1 Systematic Structural Testing of Firewall Policies JeeHyun Hwang, Tao Xie, Fei Chen, and Alex X. Liu Abstract Firewalls

More information

Software Engineering

Software Engineering Software Engineering Lecture 04: The B Specification Method Peter Thiemann University of Freiburg, Germany SS 2013 Peter Thiemann (Univ. Freiburg) Software Engineering SWT 1 / 50 The B specification method

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Determination of the normalization level of database schemas through equivalence classes of attributes

Determination of the normalization level of database schemas through equivalence classes of attributes Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,

More information

Verification of Network Management System Configurations

Verification of Network Management System Configurations Verification of Network Management System Configurations David L. Cohrs (608) 262-6617 dave@cs.wisc.edu Barton P. Miller (608) 262-3378 bart@cs.wisc.edu Computer Sciences Department University of Wisconsin

More information

Layer 2 Networking. Overview. VLANs. Tech Note

Layer 2 Networking. Overview. VLANs. Tech Note Layer 2 Networking Tech Note Overview PAN-OS is very flexible, allowing administrators to mix and match physical firewall interfaces amongst virtual wire, layer 2, layer 3, and tap mode configurations.

More information

shortcut Tap into learning NOW! Visit www.informit.com/shortcuts for a complete list of Short Cuts. Your Short Cut to Knowledge

shortcut Tap into learning NOW! Visit www.informit.com/shortcuts for a complete list of Short Cuts. Your Short Cut to Knowledge shortcut Your Short Cut to Knowledge The following is an excerpt from a Short Cut published by one of the Pearson Education imprints. Short Cuts are short, concise, PDF documents designed specifically

More information

Analysis of Policy Anomalies on Distributed Network Security Setups

Analysis of Policy Anomalies on Distributed Network Security Setups Analysis of Policy Anomalies on Distributed Network Security Setups J. G. Alfaro 1,2, F. Cuppens 1, and N. Cuppens-Boulahia 1 1 GET/ENST-Bretagne, 35576 Cesson Sévigné - France {Frederic.Cuppens,Nora.Cuppens}@enst-bretagne.fr

More information

KNOWLEDGE FACTORING USING NORMALIZATION THEORY

KNOWLEDGE FACTORING USING NORMALIZATION THEORY KNOWLEDGE FACTORING USING NORMALIZATION THEORY J. VANTHIENEN M. SNOECK Katholieke Universiteit Leuven Department of Applied Economic Sciences Dekenstraat 2, 3000 Leuven (Belgium) tel. (+32) 16 28 58 09

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

Guideline on Firewall

Guideline on Firewall CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June

More information

Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013

Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013 the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they

More information

Stateful Inspection Technology

Stateful Inspection Technology Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions

More information

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites

More information

From Network Security To Content Filtering

From Network Security To Content Filtering Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals

More information

Project 2: Firewall Design (Phase I)

Project 2: Firewall Design (Phase I) Project 2: Firewall Design (Phase I) CS 161 - Joseph/Tygar November 12, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version

More information

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation

More information

UML-based Test Generation and Execution

UML-based Test Generation and Execution UML-based Test Generation and Execution Jean Hartmann, Marlon Vieira, Herb Foster, Axel Ruder Siemens Corporate Research, Inc. 755 College Road East Princeton NJ 08540, USA jeanhartmann@siemens.com ABSTRACT

More information

8. Firewall Design & Implementation

8. Firewall Design & Implementation DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

Systematic Structural Testing of Firewall Policies

Systematic Structural Testing of Firewall Policies Systematic Structural Testing of Firewall Policies JeeHyun Hwang 1 Tao Xie 1 Fei Chen 2 Alex X. Liu 2 1 Department of Computer Science, North Carolina State University, Raleigh, NC 27695-8206 2 Department

More information

NAT REFERENCE GUIDE. VYATTA, INC. Vyatta System NAT. Title

NAT REFERENCE GUIDE. VYATTA, INC. Vyatta System NAT. Title Title VYATTA, INC. Vyatta System NAT REFERENCE GUIDE NAT Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada) Copyright COPYRIGHT Copyright 2005

More information

FIREWALL AND NAT Lecture 7a

FIREWALL AND NAT Lecture 7a FIREWALL AND NAT Lecture 7a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 3, 2015 Source of most of slides: University of Twente FIREWALL An integrated collection of security

More information

Comparing and debugging firewall rule tables

Comparing and debugging firewall rule tables Comparing and debugging firewall rule tables L. Lu, R. Safavi-Naini, J. Horton and W. Susilo Abstract: Firewalls are one of the essential components of secure networks. However, configuring firewall rule

More information

How to Painlessly Audit Your Firewalls

How to Painlessly Audit Your Firewalls W h i t e P a p e r How to Painlessly Audit Your Firewalls An introduction to automated firewall compliance audits, change assurance and ruleset optimization May 2010 Executive Summary Firewalls have become

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

A Look at the New Converged Data Center

A Look at the New Converged Data Center Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable

More information

Understanding Route Redistribution & Filtering

Understanding Route Redistribution & Filtering Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......

More information

AS/400e. TCP/IP routing and workload balancing

AS/400e. TCP/IP routing and workload balancing AS/400e TCP/IP routing and workload balancing AS/400e TCP/IP routing and workload balancing Copyright International Business Machines Corporation 2000. All rights reserved. US Government Users Restricted

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 Efficient Packet Filtering for Stateful Firewall using the Geometric Efficient Matching Algorithm. Shriya.A.

More information

TD 271 Rev.1 (PLEN/15)

TD 271 Rev.1 (PLEN/15) INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 15 TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 12/15 Geneva, 31 May - 11 June 2010 Source:

More information

Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL:

Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL: Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL: Title: FibreOP Business Internet 5 Static IP Customer Configuration Version 1.1 Summary: This document provides

More information

Firewall REFERENCE GUIDE. VYATTA, INC. Vyatta System. IPv4 Firewall IPv6 Firewall Zone-Based Firewall. Title

Firewall REFERENCE GUIDE. VYATTA, INC. Vyatta System. IPv4 Firewall IPv6 Firewall Zone-Based Firewall. Title Title VYATTA, INC. Vyatta System Firewall REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone-Based Firewall Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US

More information

FIRE-ROUTER: A NEW SECURE INTER-NETWORKING DEVICE

FIRE-ROUTER: A NEW SECURE INTER-NETWORKING DEVICE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.279

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall. Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and

More information

Cisco Configuring Commonly Used IP ACLs

Cisco Configuring Commonly Used IP ACLs Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow

More information

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and

More information

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing IP Addressing -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing Internetworking The concept of internetworking: we need to make different networks communicate

More information

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts

More information

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed

More information

1.. This UI allows the performance of the business process, for instance, on an ecommerce system buy a book.

1.. This UI allows the performance of the business process, for instance, on an ecommerce system buy a book. * ** Today s organization increasingly prompted to integrate their business processes and to automate the largest portion possible of them. A common term used to reflect the automation of these processes

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe

More information

Specification and Analysis of Contracts Lecture 1 Introduction

Specification and Analysis of Contracts Lecture 1 Introduction Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider gerardo@ifi.uio.no http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.

More information

Correspondence analysis for strong three-valued logic

Correspondence analysis for strong three-valued logic Correspondence analysis for strong three-valued logic A. Tamminga abstract. I apply Kooi and Tamminga s (2012) idea of correspondence analysis for many-valued logics to strong three-valued logic (K 3 ).

More information

Firewalls P+S Linux Router & Firewall 2013

Firewalls P+S Linux Router & Firewall 2013 Firewalls P+S Linux Router & Firewall 2013 Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network

More information

Certifying Spoofing-Protection of Firewalls

Certifying Spoofing-Protection of Firewalls Certifying Spoofing-Protection of Firewalls Cornelius Diekmann, Lukas Schwaighofer, and Georg Carle Technische Universität München Email: {diekmann schwaighofer carle}@net.in.tum.de Abstract We present

More information

Host Discovery with nmap

Host Discovery with nmap Host Discovery with nmap By: Mark Wolfgang moonpie@moonpie.org November 2002 Table of Contents Host Discovery with nmap... 1 1. Introduction... 3 1.1 What is Host Discovery?... 4 2. Exploring nmap s Default

More information

Avaya P330 Load Balancing Manager User Guide

Avaya P330 Load Balancing Manager User Guide Avaya P330 Load Balancing Manager User Guide March 2002 Avaya P330 Load Balancing Manager User Guide Copyright 2002 Avaya Inc. ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

ITL BULLETIN FOR JANUARY 2011

ITL BULLETIN FOR JANUARY 2011 ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division

More information

Chapter 3. Cartesian Products and Relations. 3.1 Cartesian Products

Chapter 3. Cartesian Products and Relations. 3.1 Cartesian Products Chapter 3 Cartesian Products and Relations The material in this chapter is the first real encounter with abstraction. Relations are very general thing they are a special type of subset. After introducing

More information